eBooks-it.org Logo
eBooks-IT.org Inner Image

Cambridge University eBooks Page 12

Download free Cambridge University eBooks Page 12

Network Security

A Decision and Game-Theoretic Approach
Network Security Image
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security....

Nanotechnologies for Future Mobile Devices

Nanotechnologies for Future Mobile Devices Image
Explore the potential for nanotechnologies to transform future mobile and Internet communications. Based on a research collaboration between Nokia, Helsinki University of Technology, and the University of Cambridge, here leading researchers review the current state-of-the art and future prospects for: Novel multifunctional materials, dirt repellent, self-healing surface materials, and lightweight structural materials capable of adapting their shape Portable energy storage using supercapacitor-battery hybrids based on new materials including carbon nanohorns and porous electrodes, fuel cell technologies, energy harvesting and more efficient solar cells Electronics and computing advances reaching beyond IC scaling limits, new computing approaches an...

Managing Knowledge Networks

Managing Knowledge Networks Image
The information context of the modern organization is rapidly evolving in the face of intense global competition. Information technologies, including databases, new telecommunications systems, and software for synthesizing information, make a vast array of information available to an ever expanding number of organizational members. Management's exclusive control over knowledge is steadily declining, in part because of the downsizing of organizations and the decline of the number of layers in an organizational hierarchy. These trends, as well as issues surrounding the Web 2.0 and social networking, mean that it is increasingly important that we understand how informal knowledge networks impact the generation, capturing, storing, dissemination, and app...

Linear Electric Actuators and Generators

Linear Electric Actuators and Generators Image
This book deals with LEAs that convert electric energy into controlled mechanical motion of limited travel and LEGs that transform mechanical energy into electric energy. Examples range from loudspeakers and microphones to magnetically levitated material transfer in ultraclean rooms. Much of the literature on linear actuators and generators covers the principles of operation and performance calculations of these devices. Little has been published on their control or on detailed design methodologies. This book presents the first unified treatment of the subject, including the construction, operation, control, and design of LEAs and LEGs. Chapters describe linear induction, permanent-magnet, linear reluctance, switched reluctance, and linear stepper ac...

Information Theory, Inference and Learning Algorithms

Information Theory, Inference and Learning Algorithms Image
Information theory and inference, often taught separately, are here united in one entertaining textbook. These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to cluste...



2007 - 2017 © eBooks-IT.org